


default search action
43rd LCN 2018: Chicago, IL, USA
- 43rd IEEE Conference on Local Computer Networks, LCN 2018, Chicago, IL, USA, October 1-4, 2018. IEEE 2018, ISBN 978-1-5386-4413-3 
- Flor Álvarez, Max Kolhagen, Matthias Hollick  : :
 Sea of Lights: Practical Device-to-Device Security Bootstrapping in the Dark. 124-132
- Kang Chen, Xin Xing  , Mijanur Rahaman Palash, Jianwei Liu, James Martin: , Mijanur Rahaman Palash, Jianwei Liu, James Martin:
 Improving Wireless Network Performance under MPTCP based Multipath Access. 133-141
- Kaiyang Liu  , Jingrong Wang, Zhuofan Liao, Boyang Yu, Jianping Pan , Jingrong Wang, Zhuofan Liao, Boyang Yu, Jianping Pan : :
 Learning-based Adaptive Data Placement for Low Latency in Data Center Networks. 142-149
- Patrick Lieser, Nils Richerzhagen, Tim Feuerbach, Tobias Meuser, Björn Richerzhagen, Ralf Steinmetz  : :
 Collaborative Decentralized Resource Reservation for Emergency Communication Networks. 150-158
- Xin Zhang, Kwan L. Yeung: 
 A Novel AID Shuffle Mechanism for RAW Slot Assignment in IEEE 802.11ah Networks. 159-166
- Safwan Alwan  , Ilhem Fajjari, Nadjib Aitsaadi: , Ilhem Fajjari, Nadjib Aitsaadi:
 Joint Routing and Wireless Resource Allocation in Multihop LTE-D2D Communications. 167-174
- Ashanie Gunathillake, Kanchana Thilakarathna  , Anura P. Jayasumana: , Anura P. Jayasumana:
 Topology Preserving Map for Wireless Sensor Networks Equipped with Directional Antennas. 175-183
- Nancy El Rachkidy, Alexandre Guitton, Megumi Kaneko  : :
 Decoding Superposed LoRa Signals. 184-190
- Iresha Pasquel Mohottige, Tim Moors: 
 Estimating Room Occupancy in a Smart Campus using WiFi Soft Sensors. 191-199
- Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah: 
 On Probabilistic Connected Components in Underwater Sensor Networks. 200-207
- Giovanna Carofiglio, Alberto Compagno, Mauro Conti  , Fabio De Gaspari , Fabio De Gaspari , Luca Muscariello: , Luca Muscariello:
 IaaS-Aided Access Control for Information-Centric IoT. 208-216
- Gandhimathi Velusamy, Ricardo Lent: 
 Experimental Evaluation of an Energy-Delay Aware Web Routing Method. 217-225
- Harini Kolamunna, Kanchana Thilakarathna  , Aruna Seneviratne: , Aruna Seneviratne:
 Maximizing the Wearable Network Lifetime through Virtualized Application Function Chaining. 226-234
- Tony, Sieteng Soh  , Mihai M. Lazarescu , Mihai M. Lazarescu , Kwan-Wu Chin , Kwan-Wu Chin : :
 Link Scheduling in Rechargeable Wireless Sensor Networks with Harvesting Time and Battery Capacity Constraints. 235-242
- Djabir Abdeldjalil Chekired  , Lyes Khoukhi, Hussein T. Mouftah: , Lyes Khoukhi, Hussein T. Mouftah:
 Multi-Level Fog Based Resource Allocation Model for EVs Energy Planning in Smart Grid. 243-250
- Cong Pu  , Xitong Zhou, Sunho Lim: , Xitong Zhou, Sunho Lim:
 Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks. 251-254
- Christoph Döpmann, Sebastian Rust, Florian Tschorsch: 
 Exploring Deployment Strategies for the Tor Network. 255-258
- Sebastian A. Henningsen, Lucas Mann, Stefan Dietzel, Björn Scheuermann: 
 Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes. 259-262
- Steffen Büchner, Alireza Hasani, Lukasz Lopacinski, Rolf Kraemer, Jörg Nolte: 
 100 Gbit/s End-to-End Communication: Adding Flexibility with Protocol Templates. 263-266
- Andreas Fiessler, Claas Lorenz, Sven Hager, Björn Scheuermann: 
 FireFlow - High Performance Hybrid SDN-Firewalls with OpenFlow. 267-270
- Ricardo Lent: 
 Analysis of Bundle Throughput Over LTP. 271-274
- Xiaoyang Zhong, Yao Liang: 
 Scalable Downward Routing for Wireless Sensor Networks and Internet of Things Actuation. 275-278
- Muhammad Omer Farooq, Dirk Pesch  : :
 Evaluation of Multi-Gateway LoRaWAN with Different Data Traffic Models. 279-282
- Muhammad Omer Farooq, Dirk Pesch  : :
 A Search into a Suitable Channel Access Control Protocol for LoRa-Based Networks. 283-286
- Abolfazl Samani, Mea Wang: 
 MaxStream: SDN-based Flow Maximization for Video Streaming with QoS Enhancement. 287-290
- Lan Lin, Xin Sun: 
 A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts. 291-294
- Bingshan Hu, Maryam Tanha, Dawood Sajjadi, Jianping Pan  : :
 Intelligent Caching in Dense Small-Cell Networks with Limited External Resources. 295-298
- Thomas Lukaseder, Kevin Stölzle, Stephan Kleber  , Benjamin Erb, Frank Kargl: , Benjamin Erb, Frank Kargl:
 An SDN-based Approach For Defending Against Reflective DDoS Attacks. 299-302
- Kalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara  : :
 In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control. 303-306
- Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache  : :
 Dynamic Placement of Extended Service Function Chains: Steiner-based Approximation Algorithms. 307-310
- Yunming Xiao  , Haifeng Sun, Zirui Zhuang , Haifeng Sun, Zirui Zhuang , Jingyu Wang , Jingyu Wang , Qi Qi: , Qi Qi:
 Common Knowledge Based Transfer Learning for Traffic Classification. 311-314
- Julius Flohr, Ekaterina Volodina, Erwin P. Rathgeb: 
 FSE-NG for managing real time media flows and SCTP data channel in WebRTC. 315-318
- Shaden Shaar, Saquib Razak, Fahim Dalvi, Syed Ali Hashim Moosavi: 
 Group Identification in Crowded Environments Using Proximity Sensing. 319-322
- Mostafa Karimzadeh, Zhongliang Zhao, Florian Gerber, Torsten Braun  : :
 Mobile Users Location Prediction with Complex Behavior Understanding. 323-326
- Oluwatobi Akanbi  , Amer Aljaedi , Amer Aljaedi , Xiaobo Zhou: , Xiaobo Zhou:
 PLS: Proactive Load Shifting for Distributed SDN Controllers. 327-330
- Cenk Gündogan, Peter Kietzmann, Thomas C. Schmidt  , Matthias Wählisch , Matthias Wählisch : :
 HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of Things. 331-334
- Lina Hao, Bryan C. K. Ng, Ying Qu: 
 Self-optimizing Scanning Parameters for Seamless Handover in IEEE 802.11 WLAN. 335-342
- Van Tong, Hai Anh Tran  , Sami Souihi, Abdelhamid Mellouk: , Sami Souihi, Abdelhamid Mellouk:
 Empirical study for Dynamic Adaptive Video Streaming Service based on Google Transport QUIC protocol. 343-350
- Congcong Miao, Jilong Wang, Hui Wang, Jun Zhang, Weiwei Zhou, Shengchao Liu  : :
 A Multi-dimension Measurement Study of a Large Scale Campus WiFi Network. 351-359
- Khireddine Benaissa  , Salim Bitam , Salim Bitam , Abdelhamid Mellouk: , Abdelhamid Mellouk:
 Context-based BSM Aggregation for Broad-Scale Applications in Vehicular Networks. 360-368
- Philippe Jacquet, Dalia Georgiana Popescu, Bernard Mans  : :
 Broadcast Speedup in Vehicular Networks via Information Teleportation. 369-376
- Jun Xu, Rouhollah Rahmatizadeh, Ladislau Bölöni, Damla Turgut: 
 Taxi Dispatch Planning via Demand and Destination Modeling. 377-384
- Denny Stohr, Timo Kalle, Andreas Mauthe, Amr Rizk, Ralf Steinmetz  , Wolfgang Effelsberg: , Wolfgang Effelsberg:
 Towards Improved DASH Adaptation in NDN: An Emulative Analysis. 385-392
- Xiaolan Jiang, Yi-Han Chiang, Yang Zhao, Yusheng Ji: 
 Plato: Learning-based Adaptive Streaming of 360-Degree Videos. 393-400
- Wenjie Li, Sharief M. A. Oteafy  , Marwan Fayed, Hossam S. Hassanein , Marwan Fayed, Hossam S. Hassanein : :
 Bitrate Adaptation-aware Cache Partitioning for Video Streaming over Information-Centric Networks. 401-408
- Diego Lopez-Pajares  , Joaquin Alvarez-Horcajo , Joaquin Alvarez-Horcajo , Elisa Rojas, Juan A. Carral, Guillermo Ibáñez: , Elisa Rojas, Juan A. Carral, Guillermo Ibáñez:
 Iterative Discovery of Multiple Disjoint Paths in Switched Networks with Multicast Frames. 409-412
- Jose Luis Carrera, Zhongliang Zhao, Torsten Braun  , Zan Li: , Zan Li:
 Real-time Smartphone Indoor Tracking Using Particle Filter with Ensemble Learning Methods. 413-416
- Joaquin Alvarez-Horcajo  , Diego Lopez-Pajares , Diego Lopez-Pajares , Elisa Rojas, Guillermo Ibáñez, Isaías Martinez-Yelmo , Elisa Rojas, Guillermo Ibáñez, Isaías Martinez-Yelmo , Maria Campos-Selfa: , Maria Campos-Selfa:
 PAST-HOAS: Fast Setup of Per-Address Sink Routing Trees by Reverse Flooding. 417-420
- Peilin Zhang, Xiaoyuan Ma  , Oliver E. Theel, Jianming Wei: , Oliver E. Theel, Jianming Wei:
 Concurrent Transmission-based Packet Concatenation in Wireless Sensor Networks. 421-424
- Guolin Sun, Sebakara Samuel Rene Adolphe, Daniel Ayepah-Mensah  : :
 Low-complexity Dynamic Resource Slicing for Mixed Traffics in Virtualized Radio Access Network. 425-428
- Vinay B. Ramakrishnaiah, Robert F. Kubichek, Suresh S. Muknahallipatna: 
 Virtual Terrain Nullification Using Phased Array Antennas for Wireless Ad Hoc Networks. 429-432
- Charalampos Stylianopoulos, Magnus Almgren  , Olaf Landsiedel, Marina Papatriantafilou: , Olaf Landsiedel, Marina Papatriantafilou:
 Geometric Monitoring in Action: a Systems Perspective for the Internet of Things. 433-436
- Afzal Hossain, Christian Poellabauer  : :
 Efficient Location Sensing in Longitudinal Cohort Studies. 437-440
- Zirui Zhuang  , Jingyu Wang , Jingyu Wang , Qi Qi, Haifeng Sun, Jianxin Liao: , Qi Qi, Haifeng Sun, Jianxin Liao:
 Graph-Aware Deep Learning Based Intelligent Routing Strategy. 441-444
- Tsubasa Inoue, Yosuke Tanigawa, Hideki Tode: 
 Strictly Prioritized Transmission of Urgent Data Based on MAC Coordination in WSNs. 445-448
- George Sedky, Amr El Mougy: 
 BCXP: Blockchain-Centric Network Layer for Efficient Transaction and Block Exchange over Named Data Networking. 449-452
- Chu Lu, Hong Liu: 
 Generative Adversarial Networks Based Industrial Protocol Construction in the Fog Computing. 453-456
- Waltenegus Dargie: 
 Multidimensional Resource Consumption Analysis of Co-Located VMs using PCA. 457-460
- Shibayan Chatterjee, Anura P. Jayasumana: 
 Exploiting Correlation for Query Resolution in Multi-attribute Structured Peer-to-Peer Networks. 461-464
- Katia Jaffrès-Runser  , Gentian Jakllari , Gentian Jakllari : :
 PCach: The Case for Pre-Caching your Mobile Data. 465-468
- Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie  , Jack Riddle: , Jack Riddle:
 Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning. 469-472
- Zuo Xiang, Frank Gabriel, Giang T. Nguyen  , Frank H. P. Fitzek , Frank H. P. Fitzek : :
 Latency Measurement of Service Function Chaining on OpenStack Platform. 473-476
- Tossaphol Settawatcharawanit, Vorapong Suppakitpaisarn, Shigeki Yamada, Yusheng Ji: 
 Segment Routed Traffic Engineering with Bounded Stretch in Software-Defined Networks. 477-480
- Amjed Belkhiri, Walid Bechkit, Hervé Rivano  : :
 Virtual Forces based UAV Fleet Mobility Models for Air Pollution Monitoring. 481-484
- Xiaoqian Li, Kwan L. Yeung: 
 ILP Formulation for Monitoring-Cycle Construction Using Segment Routing. 485-492
- Minh Nguyen, Amitangshu Pal, Saptarshi Debroy: 
 Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments. 493-501
- Ramtin Aryan, Anis Yazidi, Paal Einar Engelstad: 
 An Incremental Approach for Swift OpenFlow Anomaly Detection. 502-510
- Rhaban Hark, Mohamed Ghanmi, Sounak Kar  , Nils Richerzhagen, Amr Rizk, Ralf Steinmetz , Nils Richerzhagen, Amr Rizk, Ralf Steinmetz : :
 Representative Measurement Point Selection to Monitor Software-defined Networks. 511-518
- Jens Heuschkel, Lin Wang, Erik Fleckstein, Michael Ofenloch, Marcel Blöcher, Jon Crowcroft, Max Mühlhäuser: 
 VirtualStack: Flexible Cross-layer Optimization via Network Protocol Virtualization. 519-526
- Douglas Comer, Adib Rastegarnia: 
 OSDF: An Intent-based Software Defined Network Programming Framework. 527-535
- Samuel Brack, Robert Muth, Stefan Dietzel, Björn Scheuermann: 
 Anonymous Datagrams over DNS Records. 536-544
- Paul Walther, Carsten Rudolf Janda, Elke Franz, Mathias Pelka, Horst Hellbrück, Thorsten Strufe, Eduard A. Jorswieck: 
 Improving Quantization for Channel Reciprocity based Key Generation. 545-552
- Arash Shaghaghi, Salil S. Kanhere  , Mohamed Ali Kâafar , Mohamed Ali Kâafar , Elisa Bertino, Sanjay Jha , Elisa Bertino, Sanjay Jha : :
 Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. 553-561
- Adita Kulkarni, Anand Seetharam: 
 Exploiting Correlations in Request Streams: A Case for Hybrid Caching in Cache Networks. 562-570
- Alireza Montazeri, Nicholas R. Beaton  , Dwight J. Makaroff: , Dwight J. Makaroff:
 LRU-2 vs 2-LRU: An Analytical Study. 571-579
- Alberto Compagno, Mauro Conti  , Stefano Munari, Riccardo Lazzeretti: , Stefano Munari, Riccardo Lazzeretti:
 GATE and FENCE: Geo-Blocking Protocols for Named Data Networking. 580-588
- Ouassim Karrakchou  , Nancy Samaan, Ahmed Karmouch: , Nancy Samaan, Ahmed Karmouch:
 FCTree: A Space Efficient FIB Data Structure for NDN Routers. 589-596
- Lei Bai  , Lina Yao, Salil S. Kanhere , Lina Yao, Salil S. Kanhere , Xianzhi Wang , Xianzhi Wang , Zheng Yang: , Zheng Yang:
 Automatic Device Classification from Network Traffic Streams of Internet of Things. 597-605
- Abdelmuttlib Ibrahim Abdallaahmed  , Suleman Khan , Suleman Khan , Abdullah Gani , Abdullah Gani , Siti Hafizah Ab Hamid , Siti Hafizah Ab Hamid , Mohsen Guizani: , Mohsen Guizani:
 Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things. 606-613
- Jens Hiller  , Martin Henze , Martin Henze , Martin Serror , Martin Serror , Eric Wagner , Eric Wagner , Jan Niklas Richter, Klaus Wehrle , Jan Niklas Richter, Klaus Wehrle : :
 Secure Low Latency Communication for Constrained Industrial IoT Scenarios. 614-622
- Roman Zhohov, Dimitar Minovski, Per Johansson, Karl Andersson  : :
 Real-time Performance Evaluation of LTE for IIoT. 623-631
- Qian Gong  , Wenji Wu , Wenji Wu , Phil DeMar: , Phil DeMar:
 GoldenEye: stream-based network packet inspection using GPUs. 632-639
- Timmy Schüller, Nils Aschenbruck, Markus Chimani, Martin Horneffer: 
 On the Practical Irrelevance of Metrics on Segment Routing Traffic Engineering optimization. 640-647
- Jie Xiao, Kwan L. Yeung, Sugih Jamin: 
 CLF: An Online Coflow-Aware Packet Scheduling Algorithm. 648-656
- Jens Heuschkel, Rick Vogel, Marcel Blöcher, Max Mühlhäuser: 
 Blow up the CPU Chains! OpenCL-assisted Network Protocols. 657-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














